• Can you be 100% certain all your data is secure? • Can you be 100% certain all users secure their data? • Are you in breach of Data Protection rules? • What data is there on your mobile devices?

"self destruct" technology for lost and stolen mobile phonesShould a phone be lost or stolen, BackStopp Mobile uses a mobile’s own communications to track it down, almost anywhere in the world.

Once the device has been traced, the application starts to delete all information that could prove of interest to villains of all descriptions. As soon as the data is wiped out a report is created back at IHQ (or the office for most of us) detailing exactly what was erased, when, and can even pinpoint the location of the device.

While this might appeal to FBI and MI6 agents there is a serious reason for its existence. As with its sister tool for laptops, the application recognises that mobile devices are increasingly carrying large quantities of sensitive information, both personal and commercial. That data is very likely to appeal to a whole raft of third parties, from crooks to competitors. The application is designed to ensure that a negative situation is very quickly turned positive.

Virtuity cites an example of a hospital application being used to record patient treatment via a handheld device, bedside. With hospital security notoriously porous, these devices are often lost or stolen, complete with patient records. BackStopp locates the device using GSM and WiFi communications and deletes all the data and even the application if necessary to make absolutely sure the data is protected.

It is a fact that computer devices are becoming ever smaller more mobile and more powerful. It is inevitable that users will harness this power on the move and applications and data will be resident on mobile devices. While the industry talks about centralised data and application management the evidence of a plethora of smaller and more powerful laptops, PDAs and Smartphones suggest otherwise, at least for the foreseeable future.

In 2007 laptop purchases outstripped desktops for the first time and the trend is moving increasingly in that direction. Factors such as working in a global economy and more flexible working practises will mean more mobile computing devices than ever before. It is no surprise that mobile devices are more vulnerable to loss or theft than those in secure office environments.

The actual number of devices that are lost or stolen will probably never be known because many organisations sweep their loss under the carpet to avoid official censure or negative publicity. US legislation already obliges organisations to divulge when a laptop has been lost or stolen and the EU is set to follow suit. In short, for each organisation, losing just one laptop is enough to create unease amongst customers, staff or other stakeholders and create a problem for the management. Backstopp can take away the pain.

HOW it Works

Backstopp allows organisations and individuals to ensure the secure deletion of data and files on any PC, Laptop, PDA or Mobile phone that is lost or stolen utilising either the GSM network, Internet or RFID.

Off-premises As soon as you realise your device is stolen, either notify your Backstopp operator or login to the BackStopp Control Panel. Upon receiving a secure decommission message all data and critical system files on the lost or stolen device will be destroyed using US Department of Defence standards.On-premises Receive a SMS alert when your laptop, PC or server leaves a designated area of your workplace. If the laptop was removed maliciously, simply reply to the alert message to remotely destroy all data on the device.

Audit Trail and Business Continuity A detailed report allows the operator to see what data was destroyed, the device’s last known location and even the possibility of a photo of the culprit. BackStopp’s integration with secure online backup services means that all your data can be easily reloaded on to a replacement device.

Statistics on how many laptops, PDAs and Mobile phone are being stolen or lost per year differ widely. It is reported that some 4,973 laptops were left in London taxis alone during a six month period in 2005 (BBC News online – 24.01.05). It is fair to assume that this is not a British problem and that there equal incidents in Paris, Berlin, Munich and Amsterdam.

Recent high profile cases resulted in dreadful negative publicity. Backstopp can turn this on its head and allow an organisation affected by laptop theft reassure its customers/stakeholders/staff etc that effective measures were taken to protect their information and turn negative into positive publicity.

Using either GSM or internet communications methods Backstopp is able to securely delete predefined data contained on the laptop’s hard disk and send a comprehensive report back to the operator confirming its success. Backstopp can locate and destroy all types of data from client records, e-mail and contact files, word processor or spreadsheet documents or even cookies. The value of this data is often not considered until there is the possibility that somebody else has it.

Laptop sales have now overtaken desktops as the worldwide workforce becomes ever more mobile and high speed internet access encourages an increase in home working. At the same time PDAs and mobile phones are getting more powerful, cheaper and increasingly used in business as mini PCs and for sending and receiving information. Whatever procedures an organisation may have in place regarding data security it is inevitable that valuable and sensitive data will be stored on those devices and that data will be mobile. If the laptop is lost or worse stolen can you be absolutely sure that the data will not be compromised?

When a laptop goes missing just how confident can its owner be that the data on it will not be compromised? Backstopp is an ingenious layer of insurance that helps an organisation reach a level of confidence that while the hardware is gone the real value, information, is safely dealt with.

Backstopp is a 24/7 insurance policy that is active anywhere in the world where there is a mobile phone signal. There are some tools that go part of the way to achieving what Backstopp does but they rely on the laptop being connected to the internet, claiming that a stolen laptop is “soon connected to the web”. For Backstopp soon isn’t good enough. The data could well be long compromised by then. Backstopp starts tracing and locating the laptop as soon as it is turned on and deleting the data before the boot sequence is completed.

Type:

Our Partners

2018 Canalys Channel forum

Barcelona 9-11 October 2018

The Business Show

Olympia London 16th-17 May 2018

AMD Family..............

TECHX 6-7 September Suntec, Singapore

Free App Use EUR 001 and get 100 mins to ring India

Gitex ..... Dubai World Trade Centre UAE

Data Centre

Become a reseller Open Up a New revenue stream

Become a reseller of Telecom products with International calls for 1 pence